Lead Acid Battery Upgraded To Lithium Iron Phosphate

Lithium batteries have taken over as the primary battery chemistry from applications ranging from consumer electronics to electric vehicles and all kinds of other things in between. But the standard lithium ion battery has a few downsides, namely issues operating at temperature extremes. Lead acid solves some of these problems but has much lower energy density, and if you want to split the difference with your own battery you’ll need to build your own lithium iron phosphate (LiFePO4) pack.

[Well Done Tips] is building this specific type of battery because the lead acid battery in his electric ATV is on the decline. He’s using cylindrical cells that resemble an 18650 battery but are much larger. Beyond the size, though, many of the design principles from building 18650 battery packs are similar, with the exception that these have screw terminals so that bus bars can be easily attached and don’t require spot welding.

With the pack assembled using 3D printed parts, a battery management system is installed with the balance wires cleverly routed through the prints and attached to the bus bars. The only problem [Well Done Tips] had was not realizing that LiFePO4 batteries’ voltages settle a bit after being fully charged, which meant that he didn’t properly calculate the final voltage of his pack and had to add a cell, bringing his original 15S1P battery up to 16S1P and the correct 54V at full charge.

LiFePO4 has a few other upsides compared to lithium ion as well, including that it delivers almost full power until it’s at about 20% charge. It’s not quite as energy dense but compared to the lead-acid battery he was using is a huge improvement, and is one of the reasons we’ve seen them taking over various other EV conversions as well.

Continue reading “Lead Acid Battery Upgraded To Lithium Iron Phosphate”

[Denny] removing a plaster bust from a microwave-softened mold

PLA Mold To Plaster Bust, No Silicone Needed

3D printing is wonderful, but sometimes you just don’t want to look at a plastic peice. Beethoven’s bust wouldn’t look quite right in front of your secret door if it was bright orange PLA, after all. [Denny] over at “Shake the Future” on YouTube is taking a break from metal casting to show off a quick-and-easy plaster casting method— but don’t worry, he still uses a microwave.

Most people, when they’re casting something non-metallic from a 3D print are going to reach for castable silicone and create a mold, first. It works for chocolate just as easily as it does plaster, and it does work well. The problem is that it’s an extra step and extra materials, and who can afford the time and money that takes these days?

[Denny]’s proposal is simple: make the mold out of PLA. He’s using a resin slicer to get the negative shape for the mold, and exporting the STL to slice in PrusaSlicer, but Blender, Meshmixer and we’re pretty sure Cura should all work as well. [Denny] takes care when arranging his print to avoid needing supports inside the mold, but that’s not strictly necessary as long as you’re willing to clean them out. After that, it’s just a matter of mixing up the plaster, pouring it into the PLA, mold, and waiting.

Waiting, but not too long. Rather than let the plaster fully set up, [Denny] only waits about an hour. The mold is still quite ‘wet’ at this point, but that’s a good thing. When [Denny] tosses it in his beloved microwave, the moisture remaining in the plaster gets everything hot, softening the PLA so it can be easily cut with scissors and peeled off.

Yeah, this technique is single-use as presented, which might be one advantage to silicone, if you need multiple copies of a cast. Reusing silicone molds is often doable with a little forethought. On the other hand, by removing the plaster half-cured, smoothing out layer lines becomes a simple matter of buffing with a wet rag, which is certainly an advantage to this technique.

Some of you may be going “well, duh,” so check out [Denny]’s cast-iron benchy if his plasterwork doesn’t impress. We’ve long been impressed with the microwave crucibles shown off on “Shake the Future”, but it’s great to have options. Maybe metal is the material, or perhaps plain plastic is perfect– but if not, perchance Plaster of Paris can play a part in your play.

Continue reading “PLA Mold To Plaster Bust, No Silicone Needed”

ESP32 BTE Keyboard

Wired To Wireless: ESP32 Gives Your USB Keyboard Bluetooth

Few things rival the usability and speed of a full-sized keyboard for text input. For decades, though, keyboards were mostly wired, which can limit where you use your favorite one. To address this, [KoStard]’s latest project uses an ESP32 to bridge a USB keyboard to BLE devices.

The ESP32-S3 packs a ton of fantastic functionality into its small size and low price—including USB-OTG support, which is key here. Taking advantage of this, [KoStard] programmed an ESP32-S3 to host a keyboard over its USB port while connecting via BLE to devices like cellphones.

There are some slick tricks baked in, too: you can pair with up to three devices and switch between them using a key combo. Some of you might be wondering how you can just plug a microcontroller into a keyboard and have it work. The truth is, it doesn’t without extra hardware. Both the keyboard and ESP32-S3 need power. The simplest fix is a powered USB hub: it can be battery-powered for a truly mobile setup, or use a wired 5V supply so you never have to charge batteries.

We love seeing a simple, affordable microcontroller extend the usefulness of gear you already have. Let us know in the comments about other hacks you’ve used to connect keyboards to devices never designed for them.

Continue reading “Wired To Wireless: ESP32 Gives Your USB Keyboard Bluetooth”

Hackaday Podcast Episode 354: Firearms, Sky Driving, And Dumpster Diving

Hackaday Editors Elliot Williams and Al Williams took a break to talk about their favorite hacks last week. You can drop in to hear about articulated mirrors, triacs, and even continuous 3D-printing modifications.

Flying on an airplane this weekend? Maybe wait until you get back to read about how the air traffic control works. Back home, you can order a pizza on a Wii or run classic Basic games on a calculator.

For the can’t miss articles, the guys talked about very low Earth orbit satellites and talked about readers who dumpster dive.

Check out the links below if you want to follow along, and don’t be shy. Tell us what you think about this episode in the comments!

As always, this episode is available in DRM-free MP3.

Continue reading “Hackaday Podcast Episode 354: Firearms, Sky Driving, And Dumpster Diving”

The Defunct Scooter Company, And The Default Key

Äike were an Estonian scooter company, which sadly went bust last year. [Rasmus Moorats] has one, and since the app and cloud service the scooter depends on have lost functionality, he decided to reverse engineer it. Along the way he achieved his goal, but found a vulnerability that unlocks all Äike scooters.

The write-up is a tale of app and Bluetooth reverse engineering, ending with the startling revelation of a hardcoded key that’s simply “ffffffffffffffff”. From that he can unlock and interact with any Äike scooter, except for a subset that were used as hire scooters and didn’t have Bluetooth. Perhaps of more legitimate use is the reverse engineering of the scooter functionality.

What do you do when you find a vulnerability in a product whose manufacturer has gone? He reported to the vendor of the IoT module inside the scooter, who responded that the key was a default value that should have been changed by the Äike developers. Good luck, should you own one of these machines.

Meanwhile, scooter hacking is very much a thing for other manufacturers too.

Size (and Units) Really Do Matter

We miss the slide rule. It isn’t so much that we liked getting an inexact answer using a physical moving object. But to successfully use a slide rule, you need to be able to roughly estimate the order of magnitude of your result. The slide rule’s computation of 2.2 divided by 8 is the same as it is for 22/8 or 220/0.08. You have to interpret the answer based on your sense of where the true answer lies. If you’ve ever had some kid at a fast food place enter the wrong numbers into a register and then hand you a ridiculous amount of change, you know what we mean.

Recent press reports highlighted a paper from Nvidia that claimed a data center consuming a gigawatt of power could require half a million tons of copper. If you aren’t an expert on datacenter power distribution and copper, you could take that number at face value. But as [Adam Button] reports, you should probably be suspicious of this number. It is almost certainly a typo. We wouldn’t be surprised if you click on the link and find it fixed, but it caused a big news splash before anyone noticed.

Thought Process

Best estimates of the total copper on the entire planet are about 6.3 billion metric tons. We’ve actually only found a fraction of that and mined even less. Of the 700 million metric tons of copper we actually have in circulation, there is a demand for about 28 million tons a year (some of which is met with recycling, so even less new copper is produced annually).

Simple math tells us that a single data center could, in a year, consume 1.7% of the global copper output. While that could be true, it seems suspicious on its face.

Digging further in, you’ll find the paper mentions 200kg per megawatt. So a gigawatt should be 200,000kg, which is, actually, only 200 metric tons. That’s a far cry from 500,000 tons. We suspect they were rounding up from the 440,000 pounds in 200 metric tons to “up to a half a million pounds,” and then flipped pounds to tons.

Continue reading “Size (and Units) Really Do Matter”

Embedded TPM: Watch Out!

Today’s PCs are locked up with Trusted Platform Module (TPM) devices so much so that modern Windows versions insist on having a recent TPM to even install. These have become so prevalent that even larger embedded boards now have TPM and, of course, if you are repurposing consumer hardware, you’ll have to deal with it, too. [Sigma Star] has just the primer for you. It explains what TPM does, how it applies to embedded devices, and where the pitfalls are.

The TPM is sometimes a chip or sometimes secure firmware that is difficult to tamper with. They provide secret storage and can store boot signatures to detect if something has changed how a computer starts up. The TPM can also “sign off” that the system configuration is the same to a remote entity. This allows, for example, a network to prevent a hacked or rogue computer from communicating with other computers.

Embedded systems, usually, aren’t like PCs. A weather station at a remote location may have strangers poking at it without anyone noticing. Also, that remote computer might be expected to be working for many more years than a typical laptop or desktop computer.

This leads to a variety of security concerns that TPM 2.0 attempts to mitigate. For example, it is unreasonable to think a typical attacker might connect a logic analyzer to your PC, but for an embedded system, it is easier to imagine. There is a session-based encryption to protect against someone simply snooping traffic off the communication bus. According to the post, not all implementations use this encryption, however.

Motherboard has a slot for TPM, but no board? We’ve seen people build their own TPM boards.


Title image by [Raimond Spekking] CC BY-SA-4.0